ABSTRACT

Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications andservices from a shared pool of configurable computing resources, without the burden of local data storage and maintenance.However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection inCloud Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be ableto just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public auditabilityfor cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourceddata and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towardsuser data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage systemsupporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple userssimultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secureand highly efficient.

.

EXISTING SYSTEM

To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should bring in no new vulnerabilities towards user data privacy

PROPOSED SYSTEM

In this paper, we utilize the public key based homomorphic authenticator and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind. To support efficienthandling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient. We also show how to extent our main scheme to support batch auditing for TPA upon delegations from multi-users.

MODULE DESCRIPTION:

  1. Third Party Auditor
  2. Cryptography
  3. Cloud Computing
  4. Privacy-preserving

1. Third Party Auditor

In this module, Auditor views the all user data and verifying data .Auditor directly views all user data without key. Admin provided the permission to Auditor. After auditing data, store to the cloud.

2. Cryptography

The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called code breaking, although modern cryptography techniques are virtually unbreakable.

3. Cloud Computing

Cloud computing is the provision of dynamically scalable andoften virtualized resources asa servicesover the internetUsers need nothaveknowledge of, expertise in, or control over the technology infrastructure in the"cloud" that supports them. Cloud computing represents a major change in how westore information and run applications. Instead of hosting apps and data on anindividual desktop computer, everything is hosted in the "cloud"—an assemblage ofcomputers and servers accessed viathe Internet.

Cloud computing exhibits the following key characteristics:

1. Agilityimproves with users' ability to re-provision technological infrastructure resources.

2. Multitenancyenables sharing of resources and costs across a large pool of users thus allowing for:

3. Utilization and efficiencyimprovements for systems that are often only 10–20% utilized.

4. Reliabilityis improved if multiple redundant sites are used, which makes well-designed cloud computing suitable forbusiness continuityanddisaster recovery.

5. Performanceis monitored and consistent and loosely coupled architectures are constructed usingweb servicesas the system interface.

6. Securitycould improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to securityaudit logsmay be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security.

7. Maintenanceof cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places.

  1. Privacy-preserving

To ensure that the TPA cannot derive users’ data content from the information

Collected during the auditing process.

Architecture of Cloud Computing:

To enable privacy-preserving public auditing for cloud data storage under the aforementioned model, our protocol design should achieve the following security and performance guarantee:

1) Public auditability: to allow TPA to verify the correctness of the cloud data on demand without retrieving a copy of the whole data or introducing additional on-line burden to the cloud users.

2) Storage correctness: to ensure that there exists no cheating cloud server that can pass the audit from TPA without indeed storing users’ data intact.

3) Privacy-preserving: to ensure that there exists no way for TPA to derive users’ data content from the information collected during the

auditing process.

4) Batch auditing: to enable TPA with secure and efficient auditing capability to cope with multiple auditing delegations from possibly large number of different users simultaneously.

5) Lightweight: to allow TPA to perform auditing with minimum communication and computation overhead.

System Configuration:-

H/W System Configuration:-

Processor - Pentium –III

Speed - 1.1 Ghz

RAM - 256 MB(min)

Hard Disk - 20 GB

Floppy Drive - 1.44 MB

Key Board - Standard Windows Keyboard

Mouse - Two or Three Button Mouse

Monitor - SVGA

S/W System Configuration:-

Operating System :Windows95/98/2000/XP

Application Server : Tomcat5.0/6.X

Front End : HTML, Java, Jsp

Scripts : JavaScript.

Server side Script : Java Server Pages.

Database : Mysql

Database Connectivity : JDBC.

CONCLUSION

We propose a privacy-preserving publicauditing system for data storage security in CloudComputing. We utilize the homomorphic linear authenticatorand random masking to guarantee thatthe TPA would not learn any knowledge about thedata content stored on the cloud server during the efficientauditing process, which not only eliminates theburden of cloud user from the tedious and possiblyexpensive auditing task, but also alleviates the users’fear of their outsourced data leakage. ConsideringTPA may concurrently handle multiple audit sessionsfrom different users for their outsourced data files, wefurther extend our privacy-preserving public auditingprotocol into a multi-user setting, where the TPA canperform multiple auditing tasks in a batch mannerfor better efficiency. Extensive analysis shows that ourschemes are provably secure and highly efficient.